1 line
No EOL
2.3 KiB
JSON
1 line
No EOL
2.3 KiB
JSON
{"Event": {"info": "OSINT - CloudFanta Malware Campaign Technical Analysis", "Tag": [{"colour": "#ffffff", "exportable": true, "name": "tlp:white"}, {"colour": "#00223b", "exportable": true, "name": "osint:source-type=\"blog-post\""}], "publish_timestamp": "0", "timestamp": "1477844947", "analysis": "2", "Attribute": [{"comment": "", "category": "External analysis", "uuid": "58161ede-e344-41de-b9d2-42ae02de0b81", "timestamp": "1477844702", "to_ids": false, "value": "https://resources.netskope.com/h/i/297473838-cloudfanta-malware-campaign-technical-analysis", "disable_correlation": false, "object_relation": null, "type": "link"}, {"comment": "", "category": "External analysis", "uuid": "58161ef2-c9a8-4b13-8b3a-418c02de0b81", "timestamp": "1477844722", "to_ids": false, "value": "We recently published an overview blog about the CloudFanta malware campaign that uses the Sugarsync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities. This blog will detail the technical aspects of CloudFanta.\r\n\r\nAlthough CloudSquirrel and CloudFanta malware are not similar, we believe that both malware campaigns are deployed by the same actor based on the following similarities.", "disable_correlation": false, "object_relation": null, "type": "comment"}, {"comment": "The Sugarsync URL we observed delivering CloudFanta malware was at", "category": "Network activity", "uuid": "58161f12-58bc-4cfc-ac0d-4fe402de0b81", "timestamp": "1477844754", "to_ids": true, "value": "https://www.sugarsync.com/pf/D3202366_07280196_66523?directDownload=true", "disable_correlation": false, "object_relation": null, "type": "url"}, {"comment": "", "category": "Network activity", "uuid": "58161fc5-caa8-4cca-b4ec-4b6a02de0b81", "timestamp": "1477844933", "to_ids": true, "value": "http://192.95.39.246/xx/config/msg.txt", "disable_correlation": false, "object_relation": null, "type": "url"}, {"comment": "", "category": "Network activity", "uuid": "58161fd3-0a2c-4da3-a026-4a1c02de0b81", "timestamp": "1477844947", "to_ids": true, "value": "192.95.39.246", "disable_correlation": false, "object_relation": null, "type": "ip-dst"}], "extends_uuid": "", "published": false, "date": "2016-10-30", "Orgc": {"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f", "name": "CIRCL"}, "threat_level_id": "3", "uuid": "58161e18-c578-479e-add4-408002de0b81"}} |